Your Perfect Cybersecurity Partner

Stay Connected:

Cybersecurity Blogs | Briskinfosec
22nd July 2022

What is the difference between VA and PT ?

Thief plots heist at home. It takes him some time to figure out how to get into the house without being noticed. What we're doing here is called Vulnerability assessment.The thief could have used a glass door .

30th June 2022

How to save yourself from Phishing attacks? A quick guide!

Phishing is a type of social engineering attack used to obtain sensitive information from users, such as login credentials and credit card information.It

21st June 2022

Is there a difference between authentication and authorization in an API?

As with web applications, APIs operate on the web, but many require some sort of authentication or authorization before you can access the valuable.

11th October 2018

Server-Side Request Forgery-SSRF

Server-Side Request Forgery (SSRF) refers to an attack, wherein an attacker can send a maliciously crafted request from a vulnerable web application

18th January 2019

The Modern Rules of Mobile App Security Best Practices

Before heading into the concept of “Mobile App Security Best Practices” let’s not forget the undeniable fact that thousands of mobile applications for both Android and iOS ...

30th January 2019

Are you still fighting against decade old application attacks

In this modern digital era, online transactions play a pivotal role.

13th February 2019

Techniques to Secure your SOAP and REST API

An API is called as Application Programming Interface which is used for communication. An API acts as a middle man who delivers your request to the provider and then delivers response to

4th May 2019

Getting Started with Frida

Frida is a dynamic instrumentation toolkit. It is mainly created for testers, developers and reverse engineering enthusiasts. For mobile app security testers, Frida is like Swiss army knife.

8th July 2019

Android Manifest File Analysis 101

Android Manifest file provides the system with necessary data like application’s configuration information, permissions, and app components. Android Manifest File can be obtained by extracting any APK File and also while doing assessment, you can use APKtool & Drozer for extracting the Manifest file from the application.

31st July 2019

The security and privacy risks of face recognition authentication

Biometric Identification has changed the way people were identified. Since the Last decade, its growth is incredible and has transformed a lot of industries from military

30th September 2019

Growing Data Breaches And The Best Ways To Be Safe From Them

Data breaches – Unarguably, it’s a word that’s roaring predominantly and endlessly in each and every part of this digital world, without any precincts.

6th November 2019

This Awesome Stuff Will Make You Understand What Red Team And Blue Team Is

Most people think that Red Teaming and Blue Teaming are different approaches for testing and identifying the security flaws.

6th November 2019

Important Vulnerabilities And Smart Ways To Be Secured From Them

There’s a saying, ”Change is the only thing that never changes!” Similarly, each and every year has a change .

29th April 2020

Evolution of Ransomware and the trends in 2020

Nowadays the biggest danger that we come across and also something that we are about to face in future is The cyber threat the crime that happens via internet and technology.

4th May 2022

Is Beast Attack Really Breaking Your SSL/TLS

BEAST (Browser Exploit Against SSL/TLS) is a network vulnerability attack against TLS 1.0 and older SSL protocols. Security researchers carried out the attack for the first time in 2011, but the theoretical vulnerability was discovered in 2002.